Open JulianDroste opened 1 year ago
Hi,
We have 2 rules covering a similar behaviour.
System.Management.Automation.Dll
(which the core powershell DLL) from non powershell processes https://github.com/SigmaHQ/sigma/blob/master/rules/windows/image_load/image_load_dll_system_management_automation_susp_load.ymlHope this helps.
Hi @nasbench thanks for the swift feedback - I apparently overlooked those two rules. To my understanding the two rules should cover what I want to detect. Not too sure if the additional resources provided add anything to "enhance" the existing rules, but apart from that I think this issue can be closed :)
Still haven't delve deep into them, I appreciate you providing them and will definitely look into it to see if I can improve them in any form. I'll leave this open for now just so I can get back to you once I finish checking everything in them.
Thanks once again, really appreciate it the feedback
Description of the Idea of the Rule
I want to propose a rule enabling the detection of PowerShell without using the well-known
powershell.exe
but rather viarundll32.exe
and various other methods. Projects like PowerShx and its predecessor PowerShdll enable this method of PowerShell Execution. Happy to gather feedback from you!Public References / Example Event Log